Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Results for "cyber security"
Pontificia Universidad CatĂ³lica del PerĂº
Skills you'll gain: User Story, Functional Requirement, Requirements Analysis, User Requirements Documents, System Requirements, Software Documentation, Technical Communication
- Status: New
Skills you'll gain: Risk Mitigation, Business Process Modeling, Risk Analysis, Stakeholder Management, Process Mapping, Risk Management, Work Breakdown Structure, Stakeholder Engagement, Scope Management, Business Requirements, Presentations, Requirements Elicitation, Business Analysis, Looker (Software), Requirements Analysis, Project Management, Data Analysis Software, Operational Analysis, Dashboard, IBM Cognos Analytics
- Status: Free
University of Rochester
Skills you'll gain: Market Dynamics, Supply And Demand, Economics, Business Economics, Policty Analysis, Research, and Development, Price Negotiation, Public Policies, Market Analysis, Competitive Analysis, Consumer Behaviour, Strategic Thinking
Association of International Certified Professional Accountants
Skills you'll gain: Blockchain, FinTech, Emerging Technologies, Cryptography, Accounting and Finance Software, Technology Solutions, Supply Chain, Technical Services
Cisco Learning and Certifications
Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Threat Detection, Incident Response, Computer Security Incident Management, Malware Protection, Network Analysis, Cybersecurity, Network Security, Network Monitoring, SQL
University of California, Irvine
Skills you'll gain: Salesforce, Data Security, Customer Relationship Management (CRM) Software, Customer Engagement, Role-Based Access Control (RBAC), Customer Service, Data Maintenance, Business Reporting, Workflow Management, Data Integrity, Lead Generation, Business Process Automation, Mobile Security, Operational Efficiency
University of London
Skills you'll gain: Linux, Computer Systems, Command-Line Interface, Cybersecurity, Computer Architecture, Network Security, Vulnerability Assessments, Hardware Architecture, Application Security, Threat Detection, Authorization (Computing), Network Protocols, Virtual Private Networks (VPN), Operating Systems, Authentications, Network Monitoring, Network Analysis
Skills you'll gain: Secure Coding, Application Security, Authorization (Computing), Authentications, Data Validation, Role-Based Access Control (RBAC), Verification And Validation, Security Controls, User Accounts, Configuration Management, Package and Software Management, Data Loss Prevention, Identity and Access Management, Code Review, Software Installation, Middleware, Debugging, Dependency Analysis
UniversitĂ di Napoli Federico II
Skills you'll gain: Market Liquidity, Financial Market, Portfolio Management, Securities Trading, Investments, Securities (Finance), Equities, Capital Markets, Finance, Market Dynamics, Risk Analysis, Economics, Fixed Asset, Market Data, Risk Modeling, Derivatives, Technical Analysis, Asset Management, Risk Management, Statistical Methods
University of Illinois Urbana-Champaign
Skills you'll gain: Network Infrastructure, General Networking, Network Protocols, Network Architecture, Network Routers, Internet Of Things, Wireless Networks, Local Area Networks, Wide Area Networks, Network Switches, Virtual Local Area Network (VLAN), Network Planning And Design, Network Security
Cisco Learning and Certifications
Skills you'll gain: Cyber Threat Intelligence, Cyber Threat Hunting, Threat Detection, Vulnerability Assessments, Threat Management, Event Monitoring, Security Information and Event Management (SIEM), Continuous Monitoring, Incident Response, Security Management, Network Security, Network Analysis
- Status: NewStatus: Free
Skills you'll gain: Power BI, Microsoft Azure, Data Lakes, Data Analysis Expressions (DAX), Azure Synapse Analytics, Data Modeling, Data Governance, Data Warehousing, Microsoft SQL Servers, Data Analysis, Extract, Transform, Load, Data Import/Export, Data Integration, Real Time Data, Data Transformation, Data Management, Data Architecture, Data Pipelines, Role-Based Access Control (RBAC), Performance Tuning
In summary, here are 10 of our most popular cyber security courses
- Fundamentos de la IngenierĂa de Requisitos: Pontificia Universidad CatĂ³lica del PerĂº
- Capstone Project: Applying Business Analysis Skills :Â IBM
- The Power of Markets III: Input Markets and Promoting Efficiency:Â University of Rochester
- Blockchain Opportunities Beyond Crypto Assets :Â Association of International Certified Professional Accountants
- Threat Analysis:Â Cisco Learning and Certifications
- Salesforce Reporting:Â University of California, Irvine
- Introduction to Computer Security:Â University of London
- Laravel: Configure, Validate, Authenticate and Authorize:Â Infosec
- Finance:Â UniversitĂ di Napoli Federico II
- IoT Networking:Â University of Illinois Urbana-Champaign